====== Library ======
https://wazuh.com/ - XDR , SIEM
https://attack.mitre.org/
opensource opsec review
====== Linux Security ======
* https://pberba.github.io/security/2022/01/30/linux-threat-hunting-for-persistence-systemd-timers-cron/#73-monitoring-addition-to-cron
====== Zerotrust ======
https://docs.linuxserver.io/images/docker-kasm/ kasm
====== Zerotrust Browser ======
https://github.com/m1k1o/neko https://docs.linuxserver.io/images/docker-kasm/#usage \\
====== Headline ======
https://zeek.org/
====== Example Metasploit Framework ======
https://habr.com/ru/companies/npoechelon/articles/347702/ - Metasploit Framework
====== FIPS security for ubuntu ======
- USG - Ubuntu Security Guide (usg) - DISA-STIG compliance - [[https://ubuntu.com/security/certifications/docs/fips-enablement|link]] ++ Detail|
# USG - Ubuntu Security Guide (usg)
sudo apt-get install libopenscap8
oscap -v
oscap -V
sudo apt install ubuntu-advantage-tools
sudo ua attach |||||
sudo ua enable usg
sudo apt install usg -y
# generate report in /var/lib/usg/ , report can show result.sh ./result_XXXXX.txt
sudo usg audit cis_level1_server > result_usg_$(date +"%y%m%d").txt
TAILOR_FILENAME=tailor_cis_level1_server$(date +"%y%m%d").xml
# generate tailor for customize
sudo usg generate-tailoring cis_level1_server $TAILOR_FILENAME
#turn all off
sed -i 's/selected="true"/selected="false"/g' $TAILOR_FILENAME
# turn all what we need
sed -i '/xccdf_org.ssgproject.content_rule_sshd_set_keepaliv/s/selected="false"/selected="true"/g' $TAILOR_FILENAME
sed -i '/xccdf_org.ssgproject.content_rule_sshd_set_idle_timeout/s/selected="false"/selected="true"/g' $TAILOR_FILENAME
sed -i '/xccdf_org.ssgproject.content_rule_sshd_disable_rhosts/s/selected="false"/selected="true"/g' $TAILOR_FILENAME
sed -i '/xccdf_org.ssgproject.content_rule_sshd_disable_root_login/s/selected="false"/selected="true"/g' $TAILOR_FILENAME
sed -i '/xccdf_org.ssgproject.content_rule_sshd_set_login_grace_time/s/selected="false"/selected="true"/g' $TAILOR_FILENAME
sed -i '/xccdf_org.ssgproject.content_rule_sshd_set_max_auth_tries/s/selected="false"/selected="true"/g' $TAILOR_FILENAME
sed -i '/xccdf_org.ssgproject.content_rule_sshd_set_maxstartups/s/selected="false"/selected="true"/g' $TAILOR_FILENAME
sed -i '/xccdf_org.ssgproject.content_rule_sshd_use_strong_ciphers/s/selected="false"/selected="true"/g' $TAILOR_FILENAME
sed -i '/xccdf_org.ssgproject.content_rule_sshd_use_strong_kex/s/selected="false"/selected="true"/g' $TAILOR_FILENAME
sed -i '/xccdf_org.ssgproject.content_rule_sshd_use_strong_macs/s/selected="false"/selected="true"/g' $TAILOR_FILENAME
sed -i '/xccdf_org.ssgproject.content_rule_file_permissions_sshd_config/s/selected="false"/selected="true"/g' $TAILOR_FILENAME
usg audit --tailoring-file $TAILOR_FILENAME
sudo usg generate-fix --output ./fix.sh --tailoring-file $TAILOR_FILENAME
++
====== Openscap ======
- Security Technical Implementation Guide
- https://medium.com/@aika.nazhimidinova/cis-benchmark-of-ubuntu-22-04-openscap-security-guide-707f206e73c8
- https://medium.com/defense-unicorns/stig-scanning-with-openscap-675c7292d7cb
- https://medium.com/@raveen.gatla/the-ultimate-guide-for-security-compliance-with-openscap-part-1-26da99824c1b
- ++ Detail|
sudo apt-get install libopenscap8
oscap -v
oscap -V
sudo oscap xccdf eval --profile xccdf_org.ssgproject.content_profile_cis_level1_server --results-arf arf.xml --report $1 /usr/share/ubuntu-scap-security-guides/1/benchmarks/ssg-ubuntu2004-ds.xml
oscap info /usr/share/ubuntu-scap-security-guides/1/benchmarks/ssg-ubuntu2204-ds-1.2.xml
sudo oscap xccdf eval --profile xccdf_org.ssgproject.content_profile_stig --report report.html /usr/share/ubuntu-scap-security-guides/1/benchmarks/ssg-ubuntu2204-ds-1.2.xml
oscap xccdf generate fix --profile xccdf_org.ssgproject.content_profile_stig --fix-type bash /usr/share/ubuntu-scap-security-guides/1/benchmarks/ssg-ubuntu2204-ds-1.2.xml > fix_sig.sh
grep '2 echo "' ./fx_sig.sh
++